Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4CE0BCCC.5020504@redhat.com>
Date: Mon, 15 Nov 2010 12:53:32 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: perf bug

Upstream commit dab5855 ("perf_counter: Add mmap event hooks to 
mprotect()") is fundamentally wrong as mprotect_fixup() can free 'vma' 
due to merging. Fix the problem by moving perf_event_mmap() hook to 
mprotect_fixup(). In certain scenario, a local, unprivileged user could 
use this flaw to trigger a denial of service.

Upstream commit:
http://git.kernel.org/linus/63bfd7384b119409685a17d5c58f0b56e5dc03da

https://bugzilla.redhat.com/show_bug.cgi?id=651671

PS: I thought I requested a CVE name for this already, but it turns out 
I did not.

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.